Month: October 2016

What is debt tagging?
Debt tagging describes the wrong person being held responsible for another person’s debt. Debt collectors often use aggressive tactics and may report the outstanding debt to credit bureaus, which results in the victim’s c…http://www.noidentitytheft.com/debt-tagging/

What is a proxy server?
Proxy servers are computer applications or computer systems that act as a go-between or “intermediary” for requests made between a computer or other device and the Internet.
How does a proxy server work?
Corporate net…http://www.noidentitytheft.com/proxy-server/

What is a DDoS attack?
A Distributed Denial of Service attack – or a DDoS attack – is one that overwhelms the traffic for an online service such as a website by using a variety of sources. Thousands of DDoS attacks occur each day across the wo…http://www.noidentitytheft.com/ddos-attack/

What is tabnabbing?
Tabnabbing is considered a specific type of attack where a fake, malicious website will replace a legitimate website already open on a web browser. The goal is to mimic a legitimate site in order to entice a victim to type in a…http://www.noidentitytheft.com/tabnabbing/

What is a logic bomb?
Logic bombs, though different than a computer virus, act in similar ways to execute a dangerous attack like erasing files or an entire hard drive at a specific time when triggered by a specific event.
Are logic bombs danger…http://www.noidentitytheft.com/logic-bomb/

What is a cyber attack?
Cyber attacks are targeted efforts carried out through the Internet in order to spread dangerous programs, steal personal information, or otherwise harm the public, a private business or even a government organization.